Summary of Security Items From July 13 through July 19, 2005
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
Information in the US-CERT Cyber Security Bulletin is a compilation and includes information published by outside sources, so the information should not be considered the result of US-CERT analysis. Software vulnerabilities are categorized in the appropriate section reflecting the operating system on which the vulnerability was reported; however, this does not mean that the vulnerability only affects the operating system reported since this information is obtained from open-source information.
This bulletin provides a summary of new or updated vulnerabilities, exploits, trends, viruses, and trojans. Updates to vulnerabilities that appeared in previous bulletins are listed in bold text. The text in the Risk column appears in red for vulnerabilities ranking High. The risks levels applied to vulnerabilities in the Cyber Security Bulletin are based on how the "system" may be impacted. The Recent Exploit/Technique table contains a "Workaround or Patch Available" column that indicates whether a workaround or patch has been published for the vulnerability which the script exploits.
Vulnerabilities
The table below summarizes vulnerabilities that have been identified, even if they are not being exploited. Complete details about patches or workarounds are available from the source of the information or from the URL provided in the section. CVE numbers are listed where applicable. Vulnerabilities that affect both Windows and Unix Operating Systems are included in the Multiple Operating Systems section.
Note: All the information included in the following tables has been discussed in newsgroups and on web sites.
The Risk levels defined below are based on how the system may be impacted:
Note: Even though a vulnerability may allow several malicious acts to be performed, only the highest level risk will be defined in the Risk column.
- High - A high-risk vulnerability is defined as one that will allow an intruder to immediately gain privileged access (e.g., sysadmin or root) to the system or allow an intruder to execute code or alter arbitrary system files. An example of a high-risk vulnerability is one that allows an unauthorized user to send a sequence of instructions to a machine and the machine responds with a command prompt with administrator privileges.
- Medium - A medium-risk vulnerability is defined as one that will allow an intruder immediate access to a system with less than privileged access. Such vulnerability will allow the intruder the opportunity to continue the attempt to gain privileged access. An example of medium-risk vulnerability is a server configuration error that allows an intruder to capture the password file.
- Low - A low-risk vulnerability is defined as one that will provide information to an intruder that could lead to further compromise attempts or a Denial of Service (DoS) attack. It should be noted that while the DoS attack is deemed low from a threat potential, the frequency of this type of attack is very high. DoS attacks against mission-critical nodes are not included in this rating and any attack of this nature should instead be considered to be a "High" threat.
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference |
face="Arial, Helvetica, sans-serif">Risk |
face="Arial, Helvetica, sans-serif">Source |
MDaemon 8.0.3 | An IMAP authentication vulnerability has been reported in MDaemon that could let remote malicious user cause a Denial of Service. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Alt-N Technologies MDaemon Denial of Service | Low | Secunia Advisory: SA16097 July 19, 2005 |
Darwin Streaming Server 5.5 | A vulnerability has been reported in Darwin Streaming Server that could let remote malicious users cause a Denial of Service. Note: Only windows 2000/ 2003 should be effected. Upgrade to version 5.5.1: There is no exploit code required. | Apple Darwin Streaming Server Denial of Service | Low | Security Tracker Alert ID: 1014474, July 13, 2005 |
ASPNuke 0.80 | A vulnerability has been reported in ASPNuke ('Comment_Post.asp') that could let remote malicious users perform Cross-Site Scripting attacks. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | ASPNuke Cross-Site Scripting | High | Security Focus, 14226, July 12, 2005 |
DG Remote Control Server 1.6.2 | A vulnerability has been reported in DG Remote Control Server that could let a remote malicious user perform a Denial of Service. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | DG Remote Control Server Denial of Service | Low | Security Focus, 14263, July 14, 2005 |
DZPhp Editor 3.1.2.8 | A buffer overflow vulnerability has been reported in DZPhp Editor that could let remote malicious users to cause a Denial of Service. No workaround or patch available at time of publishing. There is no exploit code required. | DzSoft PHP Editor Denial of Service | Low | Security Tracker Alert ID: 1014507, July 18, 2005 |
WebEOC | Multiple vulnerabilities have been reported in WebEOC that could let remote malicious users perform a Denial of Service or obtain elevated privileges. Upgrade to version 6.0.2: There is no exploit code required. | WebEOC Multiple Vulnerabilities CAN-2005-2281 | Medium | Security Focus, 14249, July 13, 2005 US CERT Vulnerability Notes,VU# |
Hosting Controller 6.1 | Multiple vulnerabilities have been reported in Hosting Controller that could let remote malicious users inject SQL commands or execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Hosting Controller Multiple Vulnerabilities | High | Security Tracker Alert ID: 1014468, July 13, 2005, 1014477, |
MailEnable Professional 1.5 | A buffer overflow vulnerability has been reported in MailEnable that could let remote malicious users execute arbitrary code. Vendor Hotfix available: There is no exploit code required; however, a Proof of Concept exploit has been published. | MailEnable Arbitrary Code Execution | High | Secunia Advisory: SA15986, July 13, 2005 |
Internet Explorer 6.0SP2 | Multiple vulnerabilities have been reported in Internet Explorer, JPEG Rendering, that could let remote malicious users perform a Denial of Service. No workaround or patch available at time of publishing. A Proof of Concept exploit has been published. | Microsoft Internet Explorer Denial of Service | Low | Security Focus, 14284, 14285, 14286, July 15, 2005 |
MSN Messenger 9.0, Internet Explorer 6.0 | An image ICC profile processing vulnerability has been reported in MSN Messenger/ Internet Explorer that could let malicious users crash applications. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Microsoft MSN Messenger / Internet Explorer Application Crash | Low | Security Focus, 14288, July 16, 2005 |
Window Kernel | A vulnerability has been reported in the Windows Kernel that could let remote malicious users cause a Denial of Service. No workaround or patch available at time of publishing. Currently we are not aware of any exploits for this vulnerability. | Microsoft Windows Kernel Denial Of Service | Low | Security Focus, 14259, July 12, 2005 |
Windows (2000, Server 2003, XP) | A vulnerability has been reported in Windows Remote Desktop Protocol that could let a remote malicious user cause a Denial of Service. Workarounds available: No exploit code required. | Microsoft Windows Remote Desktop Denial of Service | Low | Microsoft Security Advisory 904797, July 16, 2005 |
Windows Connections Manager Library | A vulnerability has been reported in Windows Connections Manager Library that could let local malicious users cause a Denial of Service. No workaround or patch available at time of publishing. An exploit has been published. | Microsoft Windows Network Connections Manager Library Denial of Service | Low | Security Focus, 14260, July 14, 2005 |
Winamp 5.091 | A buffer overflow vulnerability has been reported in Winamp (ID3V2 tag processing) that could let remote malicious users execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Winamp Arbitrary Code Execution | High | Security Tracker Alert ID: 1014483, July 14, 2005 |
Small HTTP Server 3.05.28 | An FTP Service vulnerability has been reported in Small Http Server that could let remote malicious users write to arbitrary files. No workaround or patch available at time of publishing. There is no exploit code required. | Small HTTP Server Arbitrary File Writing | Medium | Security Tracker Alert ID: 1014506, July 18, 2005 |
SSH Secure Shell and Tectia Server 4.3.1 | A host key disclosure vulnerability has been reported in SSH Secure Shell and SSH Tectia Server that could let local/ remote malicious users pretend to be other servers. Update to version 4.3.2, There is no exploit code required. | SSH Secure Shell and Tectia Server Key Disclosure | Medium | SSH Vulnerability Notification, RQ #11775, June 30, 2005 |
Race Driver 1.2 | A buffer overflow vulnerability has been reported in Race Driver that could let remote malicious users execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | ToCA Race Driver Arbitrary Code Execution | High | Security Focus, 14304, July 18, 2005 |
VP-ASP 4.0, 4.5, 5.0 | Multiple vulnerabilities have been reported in VP-ASP that could let remote malicious users perform SQL injection attacks. Vendor fix available: There is no exploit code required. | VP-ASP SQL Injection | High | Security Focus, 14295, 14305, 14306, July 18, 2005 |
UNIX / Linux Operating Systems Only | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
Acrobat Reader (UNIX) 5.0.10, 5.0.9 | A buffer overflow vulnerability has been reported in the 'UnixAppOpenFilePerform()' function due to a boundary error, which could let a remote malicious user execute arbitrary code. Upgrades available at: RedHat: Gentoo: SUSE: Currently we are not aware of any exploits for this vulnerability. | Adobe Acrobat Reader UnixAppOpen | High | Adobe Security Advisory, RedHat Security Advisory, Gentoo Linux Security SUSE |
Mac OS X 10.4.1, 10.4, 10.3.3 -10.3.9 | A vulnerability has been reported because mobile users with the original AirPort card enabled could automatically connect to a malicious network. Note: This issue does not affect AirPort Extreme. Updates available at: There is no exploit code required. | Apple Mac OS X AirPort Card Automatic | High | Apple Security Advisory, APPLE-SA- 2005-07-19, July 19, 2005 |
Mac OS X Server 10.4.1, 10.4, Mac OS X 10.4.1, 10.4 | Several vulnerabilities have been reported: a vulnerability was reported due to an error in the Dashboard, which could let a remote malicious user install widgets with the same internal identifier (CFBundleIdentifier) as an Apple-supplied widgets thereby replacing it; and a remote Denial of Service vulnerability has been reported due to a NULL pointer dereference error in the TCP/IP implementation.
Upgrades available at: Currently we are not aware of any exploits for these vulnerabilities. | Apple Mac | Medium | Apple Security Advisory, APPLE-SA- 2005-07-12, July 12, 2005 |
bzip2 1.0.2 | A remote Denial of Service vulnerability has been reported when the application processes malformed archives. Ubuntu: Mandriva: TurboLinux: SUSE: OpenPKG: RedHat: FreeBSD: Conectiva: Debian: SGI: Currently we are not aware of any exploits for this vulnerability. | Low | Ubuntu Security Notice, Mandriva Linux Security Update Advisory, Turbolinux SUSE Security Summary OpenPKG RedHat Security Advisory, FreeBSD Conectiva Debian SGI Security Advisory, 20050605 | |
bzip2 1.0.2 & prior | A vulnerability has been reported when an archive is extracted into a world or group writeable directory, which could let a malicious user modify file permissions of target files. Ubuntu: Mandriva: Debian: TurboLinux: OpenPKG: RedHat: FreeBSD: Conectiva: SGI: There is no exploit code required. | Medium | Security Ubuntu Security Notice, Mandriva Linux Security Debian Security Advisory, Turbolinux OpenPKG RedHat FreeBSD Security Advisory, Conectiva Linux Announce SGI Security Advisory, 20050605- | |
Centericq 4.20 | A vulnerability has been reported in 'gaduhook::handletoken()' due to the insecure creation of temporary files, which could let a malicious user obtain elevated privileges. Debian: There is no exploit code required. | CenterICQ | Medium | Security Debian |
CUPS prior to 1.1.21rc1 | A vulnerability has been reported in incoming print jobs due to a failure to properly apply ACLs (Access Control List), which could let a remote malicious user bypass ACLs.
Upgrades available at: http://www.cups.org/ RedHat: There is no exploit code required. | Easy Software Products CUPS Access Control | Medium | Security RedHat |
FreeRADIUS 1.0.2 | Two vulnerabilities have been reported: a vulnerability was reported in the 'radius_xlat()' function call due to insufficient validation, which could let a remote malicious user execute arbitrary SQL code; and a buffer overflow vulnerability was reported in the 'sql_escape_func()' function, which could let a remote malicious user execute arbitrary code. Gentoo: SuSE: FreeRadius: RedHat: SGI: There is no exploit code required. | High | Security Gentoo Linux Security SUSE Security Summary Report, SUSE-SR:2005:014, June 7, 2005 Security Focus, 13541, RedHat SGI Security Advisory, 20050606- | |
gEdit 2.0.2, 2.2 .0, 2.10.2 | A format string vulnerability has been reported when invoking the program with a filename that includes malicious format specifiers, which could let a remote malicious user cause a Denial of Service and potentially execute arbitrary code. Ubuntu: Gentoo: RedHat: Mandriva: TurboLinux: SGI: Debian: An exploit has been published. | High | Securiteam, Ubuntu Security Notice, Gentoo Linux Security Advisory, GLSA 200506-09, RedHat Security Advisory, Mandriva Linux Security Update Advisory, MDKSA-2005:102, Turbolinux Security Advisory, SGI Security Advisory, 20050603- Debian Security Advisory, | |
cpio 1.0-1.3, 2.4.2, 2.5, 2.5.90, 2.6 | A vulnerability has been reported when an archive is extracted into a world or group writeable directory because non-atomic procedures are used, which could let a malicious user modify file permissions. Trustix: Mandriva: There is no exploit code required. | Medium | Bugtraq, 395703, Trustix Secure Linux Security Advisory, TSLSA-2005-0030, June 24, 2005 Mandriva | |
cpio 2.6 | A Directory Traversal vulnerability has been reported when invoking cpio on a malicious archive, which could let a remote malicious user obtain sensitive information. Gentoo: Trustix: Mandriva: A Proof of Concept exploit has been published. | Medium | Bugtraq, Gentoo Linux Security Advisory, GLSA Trustix Secure Mandriva Linux Security Update Advisory, MDKSA2005: | |
shtool 2.0.1 & prior | A vulnerability has been reported that could let a local malicious user gain escalated privileges. The vulnerability is caused due to temporary files being created insecurely. Gentoo: OpenPKG: RedHat: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> SGI: There is no exploit code required. | GNU shtool Insecure | Medium | Secunia Advisory, SA15496, Gentoo Linux Security Advisory, GLSA 200506 OpenPKG Trustix Secure Linux Security Advisory, SGI Security Advisory, 20050703-01-U, July 15, 2005 |
Gaim prior to 1.1.4 | A vulnerability exists in the processing of HTML that could let a remote malicious user crash the Gaim client. This is due to a NULL pointer dereference. Update to version 1.1.4: Ubuntu: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200503-03.xml"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-215.html"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Peachtree: SUSE: Currently we are not aware of any exploits for this vulnerability. | GNU Gaim href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0208">CAN-2005-0208 | Low | Sourceforge.net Gaim Gentoo, GLSA 200503-03, Mandrakelinux Security Update Advisory, RedHat Security Advisory, Conectiva Linux Security Announce-ment, CLA-2005:933, Peachtree SUSE Security Summary |
zgrep 1.2.4 | A vulnerability has been reported in 'zgrep.in' due to insufficient validation of user-supplied arguments, which could let a remote malicious user execute arbitrary commands. A patch for 'zgrep.in' is available in the following bug report: Mandriva: TurboLinux: RedHat: RedHat: SGI: Fedora: SGI: There is no exploit code required. | High | Security Tracker Alert, 1013928, Mandriva Linux Security Update Advisory, Turbolinux RedHat Security Advisory, RedHat Security Advisory, SGI Security Advisory, 20050603-01-U, June 23, 2005 Fedora Update Notification, SGI Security Advisory, 20050605 | |
HP-UX B.11.23, B.11.22, B.11.11, B.11.04, B.11.00 | A remote Denial of Service vulnerability has been reported in the Path MTU Discovery (PMTUD) functionality that is supported in the ICMP protocol. Patches available at:
href="http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=B6834AA"> Revision 2: The binary files of HPSBUX01164 will resolve the issue for the core TCP/IP in B.11.11, B.11.22, and B.11.23. The binary files of HPSBUX01164 will resolve NOT resolve the issue for IPSec. B.11.00 and B.11.04 are NOT vulnerable. The recommended workaround is to modify /etc/rc.config.d/nddconf and reboot. Rev 3: PHNE_33159 is available for B.11.11. Avaya: Rev 4: PHNE_32606 is available for B.11.23. Currently we are not aware of any exploits for this vulnerability. | Low | Hewlett Packard Company Hewlett Packard Company Hewlett Packard Company Avaya Security Bulletin, HP Security Bulletin, HPSBUX0 | |
High Availability Linux Project Heartbeat 1.2.3 | An insecure file creation vulnerability has been reported in Heartbeat that could let local users arbitrarily overwrite files. Debian: There is no exploit code required. | Heartbeat Arbitrary File Overwrite | Medium | Secunia Advisory: SA16039, Debian Security Advisory, |
ImageMagick 5.3.3, 5.3.8, 5.4.3, 5.4.4 .5, 5.4.7, 5.4.8 .2-1.1.0 , 5.4.8, 5.5.3 .2-1.2.0, 5.5.4, 5.5.6 .0-20030409, 5.5.6, 5.5.7, 6.0, 6.0.1 | Several vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported in the decoder due to a failure to handle malformed TIFF tags; a remote Denial of Service vulnerability has been reported due to a failure to handle malformed TIFF images; a remote Denial of Service vulnerability has been reported due to a failure to handle malformed PSD files; and a buffer overflow vulnerability has been reported in the SGI parser, which could let a remote malicious user execute arbitrary code. Upgrades available at: SuSE: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-070.html"> Debian: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> TurboLinux: FedoraLegacy: Currently we are not aware of any exploits for these vulnerabilities. | ImageMagick
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0759">CAN-2005-0759 | High | Security Tracker Debian Security Advisory, Mandrakelinux Security Update Advisory, Turbolinux Security Advisory, Fedora Legacy Update |
ImageMagick 6.x | A buffer overflow vulnerability exists in 'coders/psd.c' when a specially crafted Photoshop document file is submitted, which could let a remote malicious user execute arbitrary code. Update available at:
link="#999999"> Ubuntu: Debian:
href="http://security.debian.org/pool/updates/main/i/imagemagick/"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-26.xml"> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200501-37.xml"> Fedora: SGI: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> TurboLinux: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | High | iDEFENSE Ubuntu Security Notice, USN-62-1, January 18, Debian Security Advisory, Gentoo Linux Security Advisory, GLSA 200501-26, January 20, 2005 Gentoo Linux Security Mandrakelinux Security Update Advisory, Turbolinux Fedora Legacy Update | |
ImageMagick 5.3.3, 5.4.3, 5.4.4.5, 5.4.7, 5.4.8 .2-1.1.0, 5.4.8, | A buffer overflow vulnerability exists in the 'EXIF' parsing routine due to a boundary error, which could let a remote malicious user execute arbitrary code. Upgrades available at: Ubuntu: Gentoo: Debian: SUSE: Mandrakesoft: (Red Hat has re-issued it's update.) TurboLinux: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | ImageMagick Remote EXIF Parsing Buffer Overflow | High | Security Tracker Alert ID, Gentoo Linux Security Advisory, GLSA 200411-11:01, Debian Security Advisory SUSE Security Announcement, SUSE-SA:2004:041, November SUSE Security Summary Report, SUSE-SR:2004:001, November Mandrakesoft Security Advisory, MDKSA-2004: Red Hat Security Advisory, Turbolinux Fedora Legacy Update |
XV 3.10 a | Multiple vulnerabilities have been reported:a buffer overflow vulnerability was reported in the PDS image decoder when processing comments, which could let a remote malicious user execute arbitrary code; a vulnerability was reported in the TIFF and PDS image decoders due to format string errors, which could let a remote malicious execute arbitrary code; a vulnerability was reported due to an input validation error when handling filenames, which could let a remote malicious user execute arbitrary code. Gentoo: Slackware: There is no exploit code required. | John Bradley XV Multiple Vulnerabilities | High | Secunia Advisory, Gentoo Linux Security Advisory, GLSA 200504- Slackware Security |
XV 3.10 a | A format string vulnerability exists in a formatted printing function due to insufficient sanitization of user-supplied input, which could let a remote malicious user cause a Denial of Service or execute arbitrary code.
Gentoo: SUSE: Slackware: Currently we are not aware of any exploits for this vulnerability. | XV File Name Handling Remote Format String | High | Gentoo Linux Security SUSE Security Summary Slackware Security |
KDE 3.4, 3.3-3.3.2, 3.2-3.2.3 | A vulnerability has been reported in KDE Kate and KWrite because backup files are created with default permissions even if the original file had more restrictive permissions set, which could let a local/remote malicious user obtain sensitive information.
Patches available at: ftp://ftp.kde.org/pub/kde/ Fedora: There is no exploit code required. | KDE Kate, | Medium | Security Tracker Alert ID: 1014512, July 18, 2005 Fedora Update Notification, |
tcpdump 3.4 a6, 3.4, 3.5, alpha, 3.5.2, 3.6.2, 3.6.3, 3.7-3.7.2, class=bodytext>3.8.1 -3.8.3; IPCop 1.4.1, 1.4.2, 1.4.4, 1.4.5 | Remote Denials of Service vulnerabilities have been reported due to the way tcpdump decodes Border Gateway Protocol (BGP) packets, Label Distribution Protocol (LDP) datagrams, Resource ReSerVation Protocol (RSVP) packets, and Intermediate System to Intermediate System (ISIS) packets. Fedora: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Ubuntu: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-06.xml"> Mandriva: FreeBSD: Avaya: TurboLinux: SUSE: Exploit scripts have been published. | Low | Bugtraq, Fedora Update Notification, Trustix Secure Ubuntu Security Notice, Gentoo Linux Security Advisory, GLSA 200505-06, May 9, 2005 Mandriva Linux Security Update Advisory, Security Focus, 13392, May 12, 2005 FreeBSD Security Advisory, Avaya Security Advisory, Turbolinux SUSE Security Summary | |
Leafnode 1.11.2, 1.11.1, 1.9.47-1.9.29-1.9.31, 1.9.19-1.9.27 | A remote Denial of Service vulnerability has been reported in the fetchnews program (the NNTP client) due to a failure to handle network delays. Upgrades available at: Mandriva: There is no exploit code required. | Leafnode Remote Denial of Service | Low | leafnode-SA-2005:02, Mandriva Linux Security Update Advisory, |
Leafnode 1.9.48- 1.9.50, 1.11.1 | A remote Denial of Service vulnerability has been reported in the fetchnews program when reading an article header or an article body. Upgrades available at: Mandriva: There is no exploit code required. | Low | Securiteam, Mandriva Linux Security Update Advisory, | |
LibTIFF 3.4, 3.5.1-3.5.5, 3.5.7, 3.6 .0, 3.6.1, 3.7, 3.7.1 | A buffer overflow vulnerability has been reported in the 'TIFFOpen()' function when opening malformed TIFF files, which could let a remote malicious user execute arbitrary code. Patches available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-07.xml"> Ubuntu: SuSE: TurboLinux: Debian: Currently we are not aware of any exploits for this vulnerability. | High | Gentoo Linux Security Advisory, GLSA 200505-07, May 10, 2005 Ubuntu Security Notice, SUSE Security Summary Report, SUSE-SR:2005:014, Turbolinux Debian Security Advisory, DSA 755-1, July 13, 2005 | |
Bugzilla 2.18.2
| A vulnerability has been reported in Bugzilla that could let remote malicious users disclose private summaries or modify flags. Vendor fix available: Gentoo: There is no exploit code required. | Bugzilla Private Summary Disclosure or Flag Modification | Medium | Security Tracker, Alert ID: 1014428, July 8, 2005 Gentoo Linux Security |
OpenLDAP 2.1.25; Padl Software pam_ldap Builds 166, 85, 202, 199, 198, 194, 183-192, 181, 180, 173, 172, 122, 121, 113, 107, 105 | A vulnerability has been reported in OpenLDAP, 'pam_ldap,' and 'nss_ldap' when a connection to a slave is established using TLS and the client is referred to a master, which could let a remote malicious user obtain sensitive information. Trustix: Gentoo: Mandriva: There is no exploit code required. | Multiple Vendors TLS Plaintext Password | Medium | Trustix Secure Gentoo Linux Security Mandriva Linux Security Update Advisory, |
ImageMagick 6.0-6.0.8, 6.1-6.1.8, 6.2 .0.7, 6.2 .0.4, 6.2, 6.2.1 | A buffer overflow vulnerability has been reported due to a failure to properly validate user-supplied string lengths before copying into static process buffers, which could let a remote malicious user cause a Denial of Service. Upgrades available at: Fedora: Ubuntu: RedHat: SGI: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> TurboLinux: FedoraLegacy: A Proof of Concept exploit has been published. | Low | Security Focus, 13351, April 25, 2005 Fedora Update Notification Ubuntu Security Notice, RedHat Security Advisory, SGI Security Advisory, 20050503-01-U, June 8, 2005 Trustix Secure Turbolinux Security Advisory, TLSA-2005-75, July 6, 2005 Fedora Legacy Update | |
RedHat Fedora Core3; | A remote Denial of Service vulnerability has been reported in the 'bgp_update_print()' function in 'print-bgp.c' when a malicious user submits specially crafted BGP protocol data. Update available at: Fedora: Trustix:
href="ftp://ftp.trustix.org/pub/trustix/updates/"> Mandriva: Fedora: Ubuntu: TurboLinux: Slackware: A Proof of Concept exploit script has been published. | TCPDump BGP Decoding Routines Denial of Service | Low | Security Tracker Alert, 1014133, June 8, 2005 Fedora Update Notification, Trustix Secure Linux Security Advisory, TLSA-2005-0028, June 13, 2005 Mandriva Linux Security Update Advisory, Fedora Update Notification, Ubuntu Security Notice, Turbolinux Slackware Security |
Squid Web | A vulnerability exists when using the Netscape Set-Cookie recommendations for handling cookies in caches due to a race condition, which could let a malicious user obtain sensitive information. Patches available at: Ubuntu:
href=" http://security.ubuntu.com/ubuntu/pool/main/s/squid/"> Fedora: Conectiva: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> RedHat: TurboLinux: SGI: There is no exploit code required. | Medium | Secunia Advisory, SA14451, Ubuntu Security Fedora Update Notifications, Conectiva Linux Security Announce- Mandriva Linux Security Update Advisory, RedHat Security Advisory, Turbolinux SGI Security Advisory, 20050605-01-U, July 12, 2005 | |
zlib 1.2.2, 1.2.1, 1.2 .0.7, 1.1-1.1.4, 1.0-1.0.9; Ubuntu Linux 5.0 4, powerpc, i386, amd64, 4.1 ppc, ia64, ia32; SuSE Open-Enterprise-Server 9.0, Novell Linux Desktop 9.0, Linux Professional 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Personal 9.3, x86_64, 9.2, x86_64, 9.1, x86_64, Linux Enterprise Server 9; Gentoo Linux; | A buffer overflow vulnerability has been reported due to insufficient validation of input data prior to utilizing it in a memory copy operation, which could let a remote malicious user execute arbitrary code. Debian: FreeBSD: Gentoo: SUSE: Ubuntu: Mandriva: OpenBSD: OpenPKG: RedHat: Trustix: Slackware: TurboLinux: Fedora: Currently we are not aware of any exploits for this vulnerability. | Zlib Compression Library Buffer Overflow | High | Debian Security Advisory FreeBSD Security Advisory, Gentoo Linux Security Advisory, GLSA 200507- SUSE Security Announcement, SUSE-SA:2005:039, Ubuntu Security Notice, RedHat Security Advisory, RHSA-2005:569-03, Fedora Update Notifications, Mandriva Linux Security Update Advisory, OpenPKG Trustix Secure Slackware Security Turbolinux Security Fedora Update Notification, FEDORA-2005-565, July 13, 2005 SUSE Security Summary |
dhcpcd 1.3.22 | A vulnerability has been reported in dchpcd that could let a remote user perform a Denial of Service. Debian: Mandriva: Gentoo: Currently we are not aware of any exploits for this vulnerability. | dhcpcd Denial of Service | Low | Secunia, Advisory: SA15982, July 11, 2005 Debian Security Advisory, Mandriva Linux Security Update Advisory, Gentoo Linux Security |
Enlightenment Imlib2 1.0-1.0.5, 1.1, 1.1.1; | Multiple buffer overflow vulnerabilities exist in the Iimlib/Imlib2 libraries when handling malformed bitmap images, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. lmlib:
href="http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/"> ImageMagick:
href="http://www.imagemagick.org/www/download.html "> Gentoo:
href="http://security.gentoo.org/glsa/glsa-200409-12.xml"> Mandrake: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Debian: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-465.html"> SUSE: TurboLinux:
href="ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/"> Conectiva: Sun:
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57648-1&searchclause=">
href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-57645-1&searchclause=">http://sunsolve.sun.com/ TurboLinux:
href="ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2004-480.html"> Ubuntu: RedHat: SUSE: Fedora: FedoraLegacy: Currently we are not aware of any exploits for these vulnerabilities. | IMLib/IMLib2 Multiple BMP Image
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817">CAN-2004-0817 | High | Security Focus, September 1, 2004 Gentoo Linux Security Advisory, GLSA 200409-12, Mandrakelinux Security Update Advisory, Fedora Update Notifications, Turbolinux Security Advisory, RedHat Security Advisory, Debian Security Advisories, Conectiva Linux Security Sun(sm) Alert Notifications, Turbolinux Security Announcement, RedHat Security Update, RHSA-2004:480-05, Ubuntu Security RedHat Security Advisory, RHSA-2004:636-03, December SUSE Security Summary Report, SUSE-SR:2005:002, January 26, 2005 Fedora Update Notifications, Fedora Legacy Update |
glibc 2.2 | A buffer overflow vulnerability exists in the resolver libraries of glibc 2.2. SUSE: Red Hat: Mandrakesoft: Avaya: Avaya: Currently we are not aware of any exploits for this vulnerability. | Multiple Vendors glibc Buffer Overflow
| Low | SUSE Security Summary Report, SUSE-SR:2004:002, November Red Hat Mandrakesoft, MDKSA-2004: Avaya Security Advisory, ASA-2005-011, Avaya Security Advisory, |
GNU Debian Linux 3.0, sparc, s/390, ppc, mipsel, mips, m68k, ia-64, ia-32, hppa, arm, alpha; | Multiple vulnerabilities exist: a vulnerability exists when decoding BMP images, which could let a remote malicious user cause a Denial of Service; a vulnerability exists when decoding XPM images, which could let a remote malicious user cause a Denial of Service or execute arbitrary code; and a vulnerability exists when attempting to decode ICO images, which could let a remote malicious user cause a Denial of Service. Debian: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> RedHat:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> SuSE:
href=" ftp://ftp.suse.com/pub/suse/"> Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200409-28.xml"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Fedora: Sun: We are not aware of any exploits for these vulnerabilities. | gdk-pixbug BMP, ICO, and XPM Image Processing Errors
href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753">CAN-2004-0753 | High | Security Tracker Alert ID, Gentoo Linux Security Advisory, GLSA 200409- US-CERT VU#577654, VU#369358, VU#729894, VU#825374, October 1, 2004 Conectiva Fedora Legacy Update Advisory, FLSA:2005, February 24, Sun(sm) Alert Notification, 101776, June 23, 2005 Sun(sm) Alert Notification |
Graphics | A remote Denial of Service vulnerability has been reported due to a failure to handle malformed XWD image files. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-16.xml"> Ubuntu: Fedora: RedHat: SGI: Mandriva: TurboLinux: FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | Low | Gentoo Linux Security Advisory, GLSA 200505- Ubuntu Security Notice, Fedora Update Notification, RedHat Security Advisory, SGI Security Advisory, 20050602-01-U, June 23, 2005 Mandriva Linux Security Update Advisory, Turbolinux Fedora Legacy Update | |
ImageMagick 5.3.3, 5.4.3, 5.4.4 .5, 5.4.7, 5.4.8 .2-1.1.0, 5.4.8, 5.5.3 .2-1.2.0, 5.5.6 .0-20030409, 5.5.7, 6.0-6.0.8, 6.1-6.1.7, 6.2 | A format string vulnerability exists when handling malformed file names, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Update available at:
href="http://www.imagemagick.org/script/downloads.php"> Ubuntu: Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200503-11.xml"> SUSE:
href="ftp://ftp.suse.com/pub/suse/"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-320.html"> Fedora: Debian: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> FedoraLegacy: Currently we are not aware of any exploits for this vulnerability. | High | Secunia Advisory, Ubuntu Security SUSE Security Announcement, RedHat Security Advisory, Fedora Update Notifications, Debian Security Advisory, Mandrakelinux Security Update Advisory, Fedora Legacy Update Advisory, FLSA:152777, July 13, 2005 | |
Linux Kernel 2.4, 2.6 | A race condition in ia32 emulation, vulnerability has been reported in the Linux Kernel that could let local malicious users obtain root privileges or create a buffer overflow. Patch Available: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Currently we are not aware of any exploits for this vulnerability. | Linux Kernel Race Condition and Buffer Overflow | High | Security Focus, 14205, July 11, 2005 Trustix Secure Linux Security Advisory, |
MandrakeSoft Linux Mandrake 10.2 X86_64, 10.2; Rob Flynn Gaim 0.10 x, 0.10.3, 0.50-0.75, 0.78, 0.82, 0.82.1, 1.0-1.0.2, 1.1.1-1.1.4, 1.2, 1.2.1; Ubuntu Linux 4.1 ppc, ia64, ia32, 5.0 4 powerpc, i386, amd64 | Several vulnerabilities have been reported: a buffer overflow vulnerability was reported when handling long URIs due to insufficient bounds checking, which could let a remote malicious user execute arbitrary code; and a remote Denial of Service vulnerability was reported due to a NULL pointer dereference error when handling MSN messages. Rob Flynn: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-429.html"> Fedora: Gentoo: Mandriva: Ubuntu: Conectiva: SUSE: A Proof of Concept exploit script has been published. | High
| Fedora Update Notification, RedHat Security Advisory, Gentoo Linux Security Mandriva Linux Security Update Advisory, Ubuntu Security Notice, Conectiva SUSE Security Report, SUSE-SR:2005:015, SUSE Security Summary Report, SUSE-SR:2005:017, | |
RedHat Fedora Core3, Core2; | A remote Denial of Service vulnerability has been reported when an unspecified Jabber file transfer request is handled. Upgrade available at: Fedora: Gentoo: RedHat: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SGI: Peachtree:
href="http://peachtree.burdell.org/updates/"> Conectiva: Ubuntu: Slackware: SUSE: There is no exploit code required. | Low | Fedora Update Notifications, Gentoo Linux Security Advisory, GLSA 200504-05, April 06, 2005 RedHat Security Advisory, Mandriva Linux Security Update Advisory, SGI Security Advisory, 20050404-01-U, April 20, 2005 Peachtree Linux Security Notice, PLSN-0001, Conectiva Linux Security Announce-ment, CLA-2005:949, Ubuntu Security Notice, Slackware SUSE Security Summary | |
RedHat Fedora Core3, Core2; | Two vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported due to a buffer overflow in the 'gaim_markup_strip_html()' function; and a vulnerability has been reported in the IRC protocol plug-in due to insufficient sanitization of the 'irc_msg' data, which could let a remote malicious user execute arbitrary code. Update available at: Fedora: Ubuntu: Gentoo: RedHat: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SGI: Peachtree:
href="http://peachtree.burdell.org/updates/"> Conectiva: Slackware: SUSE: Currently we are not aware of any exploits for these vulnerabilities. | High | Fedora Update Notifications, Ubuntu Security Gentoo Linux Security RedHat Security Advisory, Mandriva Linux Security Update Advisory, SGI Security Advisory, 20050404- Peachtree Linux Security Notice, PLSN-0001, Conectiva Linux Security Slackware SUSE Security Summary | |
Turbolinux Turbolinux Server 10.0, 8.0, Desktop 10.0, Turbolinux Home, Appliance Server 1.0 Workgroup Edition, Hosting Edition; Trustix Secure Linux 3.0, 2.2, Secure Enterprise Linux 2.0; Sun Solaris 10.0 _x86, 10.0, 9.0 _x86 Update 2, 9.0 _x86, 9.0,
| Multiple vulnerabilities have been reported: a remote Denial of Service vulnerability was reported when a malicious user submits a specially crafted TCP connection that causes the Key Distribution Center (KDC) to attempt to free random memory; a buffer overflow vulnerability was reported in KDC due to a boundary error when a specially crafted TCP or UDP request is submitted, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported in 'krb/recvauth.c' which could let a remote malicious user execute arbitrary code. MIT: Mandriva: Fedora: RedHat: Sun: SuSE: Trustix: TurboLinux: SGI: Debian: Currently we are not aware of any exploits for these vulnerabilities. | Kerberos V5 Multiple Vulnerabilities | High | MIT krb5 Security Advisory, RedHat Security Advisory, Sun(sm) Alert Notification, 101809, July 12, 2005 Fedora Update Notifications, SUSE Security Summary Turbolinux Mandriva Linux Security Update Advisory, Trustix Secure SGI Security Advisory, 20050703-01-U, July 15, 2005 Debian Security Advisory, |
Net-SNMP 5.2.1, 5.2, 5.1-5.1.2, 5.0.3 -5.0.9, 5.0.1 | A remote Denial of Service vulnerability has been reported when handling stream-based protocols. Upgrades available at: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> Fedora: Currently we are not aware of any exploits for this vulnerability. | Net-SNMP | Low | Secunia Trustix Secure Fedora Update Notifications, |
Net-snmp 5.x | A vulnerability has been reported in 'fixproc' due to a failure to securely create temporary files in world writable locations, which could let a malicious user obtain elevated privileges and possibly execute arbitrary code. Gentoo:
href="http://security.gentoo.org/glsa/glsa-200505-18.xml"> Fedora: There is no exploit code required. | High | Gentoo Linux Security Advisory, GLSA 200505-18, May 23, 2005 Fedora Update Notifications, | |
Vixie Cron 4.1 | A vulnerability has been reported due to insecure creation of temporary files when crontab is executed with the '-e' option, which could let a malicious user obtain sensitive information. Fedora: There is no exploit code required; however, a Proof of Concept exploit script has been published. | Medium | Security Focus, 13024, April 6, 2005 Fedora Update Notification, Fedora Update Notifications, | |
phpPgAdmin 3.5.3, 3.4.1, 3.1-3.4 | A Directory Traversal vulnerability has been reported due to a failure to filter directory traversal sequences from requests to the login form, which could let a remote malicious user obtain sensitive information. Debian: There is no exploit code required; however, a Proof of Concept exploit has been published. | PHPPGAdmin Login Form Directory | Medium | Security Focus, 14142, Debian Security Advisory, DSA 759-1, July 18, 2005 |
Postgrey 1.16-1.18, 0.84-9.87 | A format string vulnerability has been reported in the 'server.pm' module in the 'log' subroutine, which could let a remote malicious user cause a Denial of Service or execute arbitrary code. Upgrades available at: SUSE: Currently, we are not aware of any exploits for this vulnerability. | High | Secunia Advisory, SUSE Security Summary Report, SUSE-SR:2005:012, SUSE Security Summary | |
Cacti 0.x | Several vulnerabilities have been reported: an SQL injection vulnerability was reported in 'config_settings.php' due to insufficient sanitization of the 'id' parameter before using in an SQL query, which could let a remote malicious user execute arbitrary SQL code; and a vulnerability was reported in 'congif_settings.php' due to insufficient sanitization of the 'config[include_path]' parameter and in 'top_graph_header.php' due to insufficient sanitization of the 'config[library_path]' parameter, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo: Conectiva: SUSE: An exploit script has been published. | RaXnet Cacti Multiple Input Validation | High | Secunia Gentoo Linux Security Advisory, GLSA 200506- Conectiva SUSE Security Summary |
Emilda 1.2-1.2.2, 1.1 | A vulnerability has been reported in 'management.php' due to insufficient validation of the 'user_id' parameter, which could let a remote malicious user bypass security restrictions. Upgrades available at: There is no exploit code required. | Emilda 'Management.PHP' Input Validation | Medium | Security Focus, 14244, July 13, 2005 |
Gaim 1.0-1.0.2, 1.1.1, 1.1.2 | Multiple remote Denial of Service vulnerabilities have been reported when a remote malicious ICQ or AIM user submits certain malformed SNAC packets; and a vulnerability exists when parsing malformed HTML data. Upgrades available at: Fedora:
href="http://download.fedora.redhat.com/pub/fedora/linux/core/updates/"> Ubuntu:
href="http://security.ubuntu.com/ubuntu/pool/main/g/gaim/"> Gentoo:
href=" http://security.gentoo.org/glsa/glsa-200503-03.xml"> Mandrake: RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-215.html"> Conectiva:
href="ftp://atualizacoes.conectiva.com.br/"> Peachtree:
href="http://peachtree.burdell.org/updates/"> Debian: SUSE: There is no exploit code required. | Low | Gaim Advisory, February 17, Fedora Update Notifications, Ubuntu Security Notice, USN-85-1 February 25, Gentoo Linux Security Advisory, GLSA 200503- Mandrakelinux Security Update Advisory, RedHat Security Advisory, RHSA-2005:215-11, Conectiva Linux Security Announcement, CLA-2005:933, March 14, 2005 Peachtree Linux Security Notice, PLSN-0002, Debian Security Advisory, SUSE Security Summary | |
Gaim prior to 1.3.1 | Several vulnerabilities have been reported: a remote Denial of Service vulnerability has been reported when using the Yahoo! protocol to download a file; and a remote Denial of Service vulnerability was reported in the MSN Messenger service when a malicious user submits a specially crafted MSN message. Updates available at: Ubuntu: Gentoo: Mandriva: Fedora: RedHat: Debian: SUSE: There is no exploit code required. | Gaim Remote Denial of Services | Low | Secunia Advisory, SA15648, Ubuntu Security Notice USN-139-1, June 10, 2005 Gentoo Linux Security Advisory, GLSA 200506- Mandriva Linux Security Update Advisory, MDKSA-2005:099, Fedora Update Notifications, RedHat Security Advisory, RHSA-2005:518-03, Debian Security Advisory, SUSE Security Summary Report, SUSE-SR:2005:017, |
Heimdal 0.6-0.6.4, 0.5.0-0.5.3, 0.4 a-f | Multiple buffer overflow vulnerabilities have been reported in the 'getterminaltype()' function due to a boundary error in telnetd, which could let a remote malicious user execute arbitrary code. Upgrades available at: Gentoo: SUSE: Debian: Currently we are not aware of any exploits for this vulnerability. | Heimdal TelnetD | High | Secunia Advisory, SA15718, Gentoo Linux Security Advisory, GLSA 200506- SUSE Security Announcement, SUSE-SA:2005:040, Debian Security Advisory, |
Shorewall 2.0.x, 2.2.x, 2.4.x | A vulnerability has been reported due to a failure to properly implement expected firewall rules for MAC address-based filtering, which could let a remote malicious user bypass firewall rules. Hotfixes available at: There is no exploit code required. | Shorewall MACLIST Firewall Rules Bypass | Medium | Secunia Advisory: SA16087, July 18, 2005 |
Skype (Linux) 1.1.0.20, 1.0.0.7, 1.0.0.1, 0.93.0.3, 0.92.0.12 | A vulnerability has been reported in '/tmp/skype_profile.jpg' due to the insecure creation of a temporary file, which could let a remote malicious user create/overwrite arbitrary files to obtain elevated privileges. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Skype Technologies Skype Insecure Temporary File Creation | Medium | ZH2005-16SA Advisory, July 16, 2005 |
SMS 1.9.2 m & prior | A vulnerability has been reported in 'contrib/miastoplusa/mpl.sh' due to the insecure creation of 'tmp/request1' and '/tmp/request2,' which could let a malicious user create/overwrite arbitrary files. No workaround or patch available at time of publishing. There is no exploit code required. | SMS Insecure Temporary File Creation | Medium | Secunia Advisory: SA16038, July 12, 2005 |
BitDefender Antivirus & Antispam for Linux 1.6.1 & prior
| A vulnerability has been reported when parsing attachments due to an error, which could let a remote malicious user user bypass certain scanning functions. The vendor has reportedly issued a patch that is downloaded automatically There is no exploit code required. | BitDefender Antivirus & Antispam for Linux and FreeBSD Mail Servers Scanning Bypass | Medium | Security Tracker Alert ID: 1014495, July 15, 2005 |
SquirrelMail 1.4.0-1.4.5-RC1. | A vulnerability has been reported in 'options_identities.php' because parameters are insecurely extracted, which could let a remote malicious user execute arbitrary HTML and script code, or obtain/manipulate sensitive information. Upgrades available at: Debian: There is no exploit code required. | SquirrelMail Variable Handling | High | GulfTech Security Research Debian Security Advisory, |
Solaris 10.0, 9.0 _x86, 9.0 | A vulnerability has been reported in LD_AUDIT,' which could let a malicious user obtain superuser privileges. Workaround and patch information available at: An exploit script has been published. | Sun Solaris Runtime Linker 'LD_AUDIT' Elevated | High | Security Focus, 14074, June 28, 2005 Sun(sm) Alert Notification, 101794, June 28, 2005 Sun(sm) Alert Notification, 101794, Updated July 12, 13, 15, 2005 |
Sudo 1.6-1.6.8, 1.5.6-1.5.9 | A race condition vulnerability has been reported when the sudoers configuration file contains a pseudo-command 'ALL' that directly follows a users sudoers entry, which could let a malicious user execute arbitrary code.
Upgrades available at: OpenBSD: Ubuntu: Fedora: Slackware: Mandriva: OpenPKG: Gentoo: SUSE: TurboLinux: RedHat: Debian: Conectiva: Debian: OpenBSD: SGI: There is no exploit code required. | Todd Miller Sudo | High | Security Focus, 13993, June 20, 2005 Ubuntu Security Notice, USN-142-1, June 21, 2005 Fedora Update Notifications, Slackware Mandriva Linux Security Update Advisory, OpenPKG Gentoo Linux Security Advisory, GLSA 200506-22, June 23, 2005 Trustix Secure SUSE Security Announce- Turbolinux RedHat Security Advisory, Debian Security Advisory, 735-1, July 1, 2005 Conectiva Debian Security Advisory, SGI Security Advisory, 20050702-01-U, July 12, 2005 |
ekg 2005-06-05 22:03 | A vulnerability has been reported in 'contrib/scripts/linki.py' due to the insecure creation of temporary files, which could let a malicious user obtain elevated privileges. Debian: There is no exploit code required. | Wojtek Kaniewski | Medium | Secunia Advisory: SA15889, Debian Security Advisory, |
Eksperymentalny Klient Gadu-Gadu (ekg) 2005-04-11 | Several vulnerabilities have been reported: a vulnerability was reported in 'contrib/ekgnv.sh,' 'contrib/getekg.sh,' and 'contrib/ekgh' due to the insecure creation of a temporary file, which could let a remote malicious user create/overwrite arbitrary files; and an SQL injection vulnerability was reported in 'contrib/scripts/ekgbot-pre1.py' due to an error, which could let a remote malicious user inject arbitrary shell commands. Debian: There is no exploit code required. | Wojtek Kaniewski EKG Insecure Temporary File Creation & SQL Injection | High | Debian Security Advisory, DSA 760-1, July 18, 2005 |
Ruby 1.8.2 | A vulnerability has been reported in the XMLRPC server due to a failure to set a valid default value that prevents security protection using handlers, which could let a remote malicious user execute arbitrary code. Fedora: TurboLinux: Debian: Gentoo: Mandriva: Currently we are not aware of any exploits for this vulnerability. | Yukihiro Matsumoto Ruby XMLRPC Server Unspecified Command Execution | High | Fedora Update Notifications, Turbolinux Debian Security Advisory, DSA 748-1, July 11, 2005 Gentoo Linux Security Mandriva Linux Security Update Advisory, |
Multiple Operating Systems - Windows / UNIX / Linux / Other | ||||
Vendor & Software Name | Vulnerability - Impact Patches - Workarounds Attacks Scripts | Common Name / CVE Reference | Risk | Source |
CaLogic 1.2.2 | Multiple remote file include vulnerabilities have been reported due to insufficient sanitization of the 'CLPATH' parameter in various scripts, which could let a remote malicious user include arbitrary files from local/external resources.
No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | CaLogic Multiple Remote File Include | High | Albania Security Clan Advisory, July 18, 2005 |
SecuRemote NG with Application Intelligence R54 | A vulnerability has been reported which could let a malicious user obtain sensitive information.
No workaround or patch available at time of publishing. There is no exploit code required. | Check Point SecuRemote NG Local Information Disclosure | Medium | Security Focus, 14221, July 12, 2005 |
ONS 15216 OADM 2.2.2, 2.0 | A remote Denial of Service vulnerability has been reported when specially crafted data is submitted to the telnet management interface. Update information available at: Currently we are not aware of any exploits for this vulnerability. | Cisco ONS 15216 OADM Telnet Processing Remote Denial of Service | Low | Cisco Security Advisory, cisco-sa-20050713, July 13, 2005 |
ClamaAV 0.x | A Denial of Service vulnerability has been reported in the Quantum decompressor due to an unspecified error. Updates available at: Gentoo: Trustix: SUSE: Debian: Conectiva: Mandriva: Currently we are not aware of any exploits for this vulnerability. | ClamAV Quantum Decompressor Denial of Service | Low | Secunia Trustix Security Advisory, TSLSA-2005-0029, June 24, 2005 Gentoo Linux Security SUSE Security Announcement, SUSE-SA:2005:038, June 29, 2005 Debian Security Advisory, DSA 737-1, July 6, 2005 Conectiva Linux Announcement, CLSA-2005:973, July 6, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:113, July 12, 2005 |
forum 0.24.4, 0.23.2 | Several vulnerabilities have been reported: a Cross-Site Scripting vulnerability was reported in 'users.php' due to insufficient sanitization of the 'group' parameter, which could let a remote malicious user execute arbitrary HTML and script code; and an SQL injection vulnerability was reported in 'viewattach.php' due to insufficient sanitization of the 'id' parameter and in 'viewforum.php' due to insufficient sanitization of the 'id' and 'forum' parameters, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | Class-1 Forum Cross Site Scripting &SQL Injection | High | Secunia Advisory: SA16078, July 14, 2005 |
Clever Copy 2.0 a, 2.0 | Several vulnerabilities have been reported: Cross-Site Scripting vulnerability has been reported in the 'users.php' script due to insufficient sanitization of the 'viewuser_id' and 'group' variables, which could let a remote malicious user execute arbitrary HTML and script code; and an SQL injection vulnerability has been reported due to insufficient validation of user-supplied input to various variables, which could let a remote malicious user execute arbitrary SQL code. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | Clever Copy Cross-Site Scripting & SQL Injection | High | Security Tracker Alert ID: 1014485, July 14, 2005 |
Dvbbs 7.1, SP2 | A Cross-Site Scripting vulnerability has been reported in 'ShowErr.asp' due to insufficient satiation of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | DVBBS ShowErr.ASP Cross-Site Scripting | High | Security Focus, 14223, July 12, 2005 |
e107 website system 0.6 10-0.617 | A Cross-Site Scripting vulnerability has been reported due to insufficient filtering of HTML code from BBCode URL tags, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | e107 BBCode URL Tag Input Validation | High | Security Tracker Alert ID: 1014513, July 18, 2005 |
IBM Lotus Notes 6.5-6.5.4, 6.0-6.0.5, 5.0.12, 5.0.3 | An input validation vulnerability has been reported because HTML and JavaScript attached to received email messages is executed automatically when viewing the email, which could let a remote malicious user execute arbitrary code. Update information available at: A Proof of Concept exploit script has been published. | IBM Lotus Notes Script Execution | High | Security Focus, 14164, July 6, 2005 Security Focus, 14164, July 14, 2005
|
Invision Board 2.1 Alpha2, 2.0-2.0.4, 1.3.1 Final, 1.3, 1.3 Final | An SQL injection vulnerability has been reported in the 'Login.php' script due to insufficient validation of user-supplied input, which could let a remote malicious user execute arbitrary SQL commands to obtain administrative access. No workaround or patch available at time of publishing. A Proof of Concept exploit script has been published. | Invision PowerBoard 'login.php' SQL Injection | High | Hackers Center Security Group Zinho's Security Advisory, July 16, 2005 |
Laffer 0.3.2 .7, 0.3.2 .6
| A vulnerability has been reported in the 'IM.PHP' file due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary PHP code.
Upgrades available at: There is no exploit code required. | Laffer | High | Security Focus, 14264, July 14, 2005 |
JRun 4.0, SP1 & 1a, build 61650, ColdFusion MX Enterprise with JRun 6.1, ColdFusion MX Enterprise Multi-Server Edition 7.0 | A vulnerability has been reported because the same authentication token may be assigned to two different sessions under high load situations, which could let a remote malicious user access another user's session. Patches available at: There is no exploit code required. | Macromedia JRun Duplicate Authentication Tokens | Medium | Macromedia Security Advisory, MPSB05-05, July 14, 2005 |
Simple Message Board 2.0 beta1 | A Cross-Site Scripting vulnerability has been reported in the 'forum.cfm,' 'user.cfm,' 'thread.cfm,' and 'search.cfm' scripts due to insufficient filtering of HTML code from user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. Proofs of Concept exploits have been published. | Simple Message Cross-Site Scripting | High | Security Tracker Alert ID: 101449, July 15, 2005 |
Firefox 0.x, 1.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set As Wallpaper' context menu on an image URL that is really a javascript; a vulnerability was reported in the 'InstallTrigger.install()' function due to an error in the callback function, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to an error when handling 'data:' URL that originates from the sidebar, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because it is possible for remote malicious user to steal information and possibly execute arbitrary code by using standalone applications such as Flash and QuickTime to open a javascript: URL; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code. Updates available at: Gentoo: Mandriva: Exploits have been published. | Firefox Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16043, July 13, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:120, July 13, 2005 Gentoo Linux Security Advisory, GLSA 200507-14, July 15, 2005 |
Mozilla Browser 1.0-1.0.2, 1.1-1.7.6, Firefox 0.8-0.10.1, 1.0.1, 1.0.2; Netscape Navigator 7.0, 7.0.2, 7.1, 7.2, 7.0-7.2 | Multiple vulnerabilities have been reported: a vulnerability was reported in the 'EMBED' tag for non-installed plugins when processing the 'PLUGINSPAGE' attribute due to an input validation error, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because blocked popups that are opened through the GUI incorrectly run with 'chrome' privileges, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because the global scope of a window or tab are not cleaned properly before navigating to a new web site, which could let a remote malicious user execute arbitrary code; a vulnerability was reported because the URL of a 'favicons' icon for a web site isn't verified before changed via JavaScript, which could let a remote malicious user execute arbitrary code with elevated privileges; a vulnerability was reported because the search plugin action URL is not properly verified before used to perform a search, which could let a remote malicious user execute arbitrary code; a vulnerability was reported due to the way links are opened in a sidebar when using the '_search' target, which could let a remote malicious user execute arbitrary code; several input validation vulnerabilities were reported when handling invalid type parameters passed to 'InstallTrigger' and 'XPInstall' related objects, which could let a remote malicious user execute arbitrary code; and vulnerabilities were reported due to insufficient validation of DOM nodes in certain privileged UI code, which could let a remote malicious user execute arbitrary code. Upgrades available at:
href="http://www.mozilla.org/products/mozilla1.x/" Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-18.xml"> RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html">
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/errata/ TurboLinux: SUSE: RedHat: SGI: Ubuntu: Mandriva: FedoraLegacy: SCO: Gentoo: An exploit script has been published. | Mozilla Suite / Firefox Multiple Vulnerabilities
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0752">CAN-2005-0752
| High | Mozilla Foundation Security Advisories, 2005-35 - Gentoo Linux Security Advisory, GLSA 200504-18, April 19, 2005 RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005-386., April 21 & 26, 2005 Turbolinux Security Advisory, SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005 RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005 SGI Security Advisory, 20050501-01-U, May 5, 2005 Ubuntu Security Notice, USN-124-1 & USN-124-2, May 11 & 12, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:088, Mandriva Linux Security Update Advisory, MDKSA-2005:088-1, Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005 PacketStorm, May 23, 2005 SCO Security Advisory, SCOSA-2005.29, July 1, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 |
Mozilla 0.x, 1.0-1.6, 1.7.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported in the 'InstallTrigger.install()' function because the callback function is not properly cleared before navigating to a new site, which could let a remote malicious user execute arbitrary code; an input validation vulnerability was reported in the 'InstallVersion.compareTo()' function when handling unexpected JavaScript objects, which could let a remote malicious user cause a Denial of Service and possibly execute arbitrary code; a vulnerability was reported due to an error when handling DOM node names with different namespaces, which could let a remote malicious user execute arbitrary code; and a vulnerability was reported due to insecure cloning of base objects, which could let a remote malicious user execute arbitrary code. Upgrades available at: Currently we are not aware of any exploits for these vulnerabilities. | Mozilla Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16059, July 13, 2005 |
In-Reach LX-8000S 3.5 , LX-4000S 3.5, LX-1000S 3.5 | A vulnerability has been reported because under certain circumstances the devices fail to verify port-based access controls, which could let a remote malicious user bypass server access controls. No workaround or patch available at time of publishing. There is no exploit code required. | MRV Communications In-Reach Console Servers Access Control Bypass | Medium | Security Focus, 14300, July 18, 2005 |
Mozilla.org Mozilla Browser 1.7.6, Firefox 1.0.1, 1.0.2; K-Meleon K-Meleon 0.9; Netscape 7.2; K-Meleon 0.9 | A vulnerability has been reported in the javascript implementation due to improper parsing of lamba list regular expressions, which could a remote malicious user obtain sensitive information. The vendor has issued a fix, available via CVS. RedHat:
href="http://rhn.redhat.com/errata/RHSA-2005-383.html">
href="http://rhn.redhat.com/errata/RHSA-2005-386.html">http://rhn.redhat.com/errata/ Slackware:
href="http://www.mozilla.org/projects/security/known-vulnerabilities.html"> TurboLinux: SUSE: RedHat: SGI: Mandriva: FedoraLegacy: SCO: Gentoo: There is no exploit code required; however, a Proof of Concept exploit has been published. | Medium | Security Tracker Alert, 1013635, April 4, 2005 Security Focus, 12988, April 16, 2005 RedHat Security Advisories, RHSA-2005:383-07 & RHSA-2005:386-08, Turbolinux Slackware Security Advisory, SSA:2005-111-04, April 22, 2005 SUSE Security Announcement, SUSE-SA:2005:028, April 27, 2005 RedHat Security Advisory, RHSA-2005:384-11, April 28, 2005 SGI Security Advisory, 20050501-01-U, May 5, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:088, Mandriva Linux Security Update Advisory, MDKSA-2005:088-1, Fedora Legacy Update Advisory, FLSA:152883, May 18, 2005 SCO Security Advisory, SCOSA-2005.29, July 1, 2005 Gentoo Linux Security Advisory, GLSA 200507-17, July 18, 2005 | |
Squid Web Proxy Cache2.5. | A vulnerability has been reported in the DNS client when handling DNS responses, which could let a remote malicious user spoof DNS lookups. Patch available at: Trustix: Fedora: Ubuntu: RedHat: TurboLinux: SGI: Currently we are not aware of any exploits for this vulnerability. | Medium | Security Focus, 13592, Trustix Secure Linux Security Advisory, Fedora Update Notification, Ubuntu Security Notice, RedHat Security Advisory, RHSA-2005:415-16, June 14, 2005 Turbolinux Security Advisory, SGI Security Advisory, 20050605-01-U, July 12, 2005 | |
Windows XP, Server 2003 Windows Services for UNIX 2.2, 3.0, 3.5 when running on Windows 2000 Berbers V5 Release 1.3.6 AAA Intuit LX, Converged Communications Server (CCS) 2.x, MN100, Modular Messaging 2.x, S8XXX Media Servers | An information disclosure vulnerability has been reported that could let a remote malicious user read the session variables for users who have open connections to a malicious telnet server. Updates available: http://www.microsoft.com/ RedHat: Microsoft: SUSE: AAA: Trustix: RedHat: SGI: Mandriva: Microsoft: Bulletin revised to communicate the availability of security updates for Services for UNIX 2.0 and Services for UNIX 2.1. The “Security Update Information” section has also be revised with updated information related to the additional security updates. Currently we are not aware of any exploits for this vulnerability. | Multiple Vendor Telnet Client Information Disclosure | Medium | Microsoft, iD EFENSE Security Advisory, June 14, 2005 Red Hat Security Advisory, Microsoft Security Bulletin, SUSE Security Summary AAA Security Advisory, ASA-2005-145, Trustix Secure Linux Security Advisory, TSLSA-2005-0030, RedHat Security Advisory, RHSA-2005:567-08, July 12, 2005 SGI Security Advisories, 20050605-01-U, 20050702-01-U, & 20050703-01-U, July 12 & 15, 2005 Microsoft Security Bulletin, Mandriva Linux Security Update Advisory, MDKSA-2005:119, July 14, 2005 |
MPlayer 1.0pre6 & prior; Xine 0.9.9-1.0; Peachtree Linux release 1 | Several vulnerabilities have been reported: a buffer overflow vulnerability has been reported due to a boundary error when processing lines from RealMedia RTSP streams, which could let a remote malicious user execute arbitrary code; and a buffer overflow vulnerability has been reported due to a boundary error when processing stream IDs from Microsoft Media Services MMST streams, which could let a remote malicious user execute arbitrary code. Patches available at: Gentoo:
href="http://security.gentoo.org/glsa/glsa-200504-19.xml"> Patches available at: Gentoo: SUSE: Slackware: TurboLinux: Mandriva: Currently we are not aware of any exploits for these vulnerabilities. | High | Security Tracker Alert,1013771, April 20, 2005 Gentoo Linux Security Advisory, GLSA 200504-19, April 20, 200 Peachtree Linux Security Notice, PLSN-0003, April 21, 2005 Xine Security Announcement, XSA-2004-8, April 21, 2005 Gentoo Linux Security Advisory, GLSA 200504-27, April 26, 2005 SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005 Slackware Security Advisory, SSA:2005-121-02, May 3, 2005 SUSE Security Summary Report, SUSE-SR:2005:013, May 18, 2005 Turbolinux Security Advisory, TLSA-2005-65, June 15, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:115, July 12, 2005 | |
See href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791">US-CERT VU#222750 for complete list | Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) do not adequately validate ICMP error messages, which could let a remote malicious user cause a Denial of Service. Cisco: IBM: RedHat:
href="http://rhn.redhat.com/errata/"> Sun: ALAXALA: Customers are advised to contact the vendor in regards to obtaining and applying the appropriate update. HP: Currently we are not aware of any exploits for these vulnerabilities. | Multiple Vendor TCP/IP Implementation ICMP Remote Denial of Service
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060">CAN-2004-1060 | Low | Sun(sm) Alert Notification, 57746, April 29, 2005 Security Focus, 13124, May 21, 2005 HP Security Bulletin, |
Squid Web Proxy Cache 2.3, STABLE2, STABLE4-STABLE7, 2.5, STABLE1, STABLE3-STABLE9 | A remote Denial of Service vulnerability has been reported when a malicious user prematurely aborts a connection during a PUT or POST request. Patches available at: Conectiva: Ubuntu: TurboLinux: Mandrake:
href="http://www.mandrakesecure.net/en/ftp.php"> SUSE: RedHat: SGI: There is no exploit code required. | Low | Security Focus, 13166, April 14, 2005 Turbolinux Security Advisory, TLSA-2005-53, April 28, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:078, April 29, 2005 SUSE Security Summary Report, SUSE-SR:2005:012, April 29, 2005 RedHat Security Advisory, RHSA-2005:415-16, June 14, 2005 SGI Security Advisory, 20050605-01-U, July 12, 2005 | |
Xoops 2.0.10-2.0.12, 2.0.9 .3, 2.0.9.2, 2.0.5-2.0.5.2, 2.0- 2.0.3; | A vulnerability was reported due to insufficient sanitization of the 'eval()' call, which could let a remote malicious user execute arbitrary PHP code. Drupal: Mandriva: Pear: PhpMyFaq: S9Y Serendipity: Trustix:
href="http://http.trustix.org/pub/trustix/updates/"> WordPress: XML-RPC: Xoops: Gentoo: http://security.gentoo.org/ http://security.gentoo.org/ http://security.gentoo.org/ Fedora: Ubuntu: Debian: http://security.debian.org/ http://security.debian.org/ SGI: SuSE: Trustix: Exploit scripts have been published. | Multiple Vendors XML-RPC for PHP Remote Code Injection | High | Security Focus, 14088, June 29, 2005 Gentoo Linux Security Advisory, GLSA 200507-01, July 3, 2005 Fedora Update Notifications, Ubuntu Security Notice, USN-147-1 & USN-147-2, July 05 & 06, 2005 Gentoo Linux Security Advisory, GLSA 200507-06, July 6, 2005 Gentoo Linux Security Advisory, GLSA 200507-07, July 10, 2005 SuSE Security Announcement, SUSE-SA:2005:041, July 8, 2005 Debian Security Advisories, DSA 745-1, 747-1, & DSA 746-1, July 10 & 13, 2005 Trustix Secure Linux Security Advisory, TSLSA-2005-0036, July 14, 2005 SGI Security Advisory, 20050703-01-U, July 15, 2005 Gentoo Linux Security Advisory, GLSA 200507-15, July 15, 2005 |
netPanzer 0.8 | A remote Denial of Service vulnerability has been reported due to an error in the network code. Update available at: http://netpanzer.berlios.de/ A Proof of Concept exploit script has been published. | NetPanzer Remote Denial of Service | Low | Security Focus, 14257, July 13, 2005 |
Netscape 8.x | Multiple vulnerabilities have been reported: a vulnerability was reported due to an error because untrusted events generated by web content are delivered to the browser user interface; a vulnerability was reported because scripts in XBL controls can be executed even when JavaScript has been disabled; a vulnerability was reported because remote malicious users can execute arbitrary code by tricking the user into using the 'Set as Background' context No workaround or patch available at time of publishing. Currently we are not aware of any exploits for these vulnerabilities. | Netscape Multiple Vulnerabilities CAN-2005-2260 | High | Secunia Advisory: SA16044, July 14, 2005 |
Affix 3.0-3.2, 2.1-2.1.2, 2.0-2.0.2 | A buffer overflow vulnerability has been reported in Affix BTFTP that could let remote malicious users execute arbitrary code. Vendor patch available: Debian: An exploit has been published. | Nokia Affix BTFTP Arbitrary Code Execution | High | Security Focus, 14230, July 12, 2005 Debian Security Advisory, DSA 762-1, July 19, 2005 |
Affix 3.0-3.2, 2.1-2.1.2, 2.0-2.0.2 | A vulnerability has been reported in btsrv/btobex due to insufficient sanitization of input before using in a 'system()' call, which could let a remote malicious user execute arbitrary code.
Patches available at: Debian: There is no exploit code required; however, a Proof of Concept exploit has been published. | Nokia Affix BTSRV/BTOBEX Remote Command Execution | High | Security Focus, 14232, July 12, 2005 Debian Security Advisory, DSA 762-1, July 19, 2005 |
Groupwise 6.5, SP1-SP4 | A Cross-Site Scripting vulnerability has been reported in emails due to insufficient sanitization of input passed in <IMG> HTML tags before displaying, which could let a remote malicious user execute arbitrary script code. The vendor has announced that GroupWise releases dated after July 11, 2005 are not affected. A Proof of Concept exploit has been published. | Novell GroupWise WebAccess Cross-Site Scripting | High | Novell Technical Information Document, TID10098301, July 18, 2005 |
Oracle Application Server 10g, | Several vulnerabilities were reported in Oracle Database which could let a remote malicious user cause a Denial of Service or obtain access to the database. Patch information available at: Currently we are not aware of any exploits for these vulnerabilities. | Oracle Products Multiple Unspecified Vulnerabilities | Medium | Oracle Critical Patch Update, July 2005 |
Oracle Reports 10g 9.0.2 | Multiple Cross-Site Scripting vulnerabilities have been reported due to insufficient sanitization of user-supplied input, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Oracle Reports Server Multiple Cross-Site Scripting | High | Red Base Security Advisory, July 19, 2005 |
Oracle Reports6i 6.0.8.19, 6.0.8, Reports 9i, Reports 6, Reports 10g 9.0-9.0.4 .3.3 | Multiple vulnerabilities have been reported: a vulnerability was reported in 'DESNAME' which could let a malicious user execute arbitrary code; a vulnerability was reported when handling HTTP GET requests due to a failure to restrict access to arbitrary XML files, which could let a malicious user obtain sensitive information; a vulnerability was reported in HTTP GET requests due to a failure to restrict access to parts arbitrary files, which could let a malicious user obtain sensitive information; a vulnerability was reported when a report file is placed in a globally accessible location, which could let a malicious user execute arbitrary commands; and an unauthorized form execution vulnerability was reported, which could let a malicious user execute arbitrary commands. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | Oracle Reports Multiple Vulnerabilities | High | Red Base Security Advisory, July 19, 2005 |
osCommerce 2.2 ms2 | An information disclosure vulnerability has been reported in 'Update.php,' which could let a remote malicious user obtain sensitive information. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | OSCommerce Update.PHP Information Disclosure | Medium | Security Focus, 14294, July 18, 2005 |
MooseGallery 1.0.2, 1.0.1 | A vulnerability has been reported in the 'display.php' script due to insufficient validation of the 'type' parameter, malicious user execute arbitrary PHP code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | MooseGallery 'display.php' Include File | High | Security Tracker Alert ID: 1014487, July 14, 2005 |
PHPCounter 7.2
| A Cross-Site Scripting vulnerability has been reported in 'index.php' due to insufficient sanitization of the 'EpochPrefix' parameter, which could let a remote malicious user execute arbitrary HTML and script code. It is also possible to obtain the full path to 'prelims.php' by accessing it directly. No workaround or patch available at time of publishing. There is no exploit code required. | PHPCounter EpochPrefix Cross-Site Scripting & Path Disclosure | High | Secunia Advisory: SA15816, July 14, 2005 |
PHPPage | A Cross-Site Scripting vulnerability has been reported in 'admin.php' and 'login.php' due to insufficient sanitization of the 'username' parameter, which could let a remote malicious user execute arbitrary HTML and script code.
No workaround or patch available at time of publishing. There is no exploit code required; however, Proofs of Concept exploits have been published. | PHPPageProtect Cross-Site Scripting | High | Secunia Advisory: SA16110, July 19, 2005 |
PHPsFTPd 0.4, 0.2 | A vulnerability has been reported in 'Inc.Login.php' due to an error in the authentication process, which could let a remote malicious user obtain administrative access. Upgrades available at: There is no exploit code required; however, an exploit script has been published. | PHPsFTPd 'Inc.Login.PHP' Elevated Privileges | High | Secunia Advisory: SA15879, July 14, 2005 |
PhpXMail 1.1 | A vulnerability has been reported in PhpXMail that could allow a remote malicious user to bypass authentication. Upgrade available at: There is no exploit code required. | PhpXmail Authentication Bypassing | Medium | Secunia, Advisory: SA15951, July 7, 2005 Security Focus, 14175, July 14, 2005 |
PowerDNS 2.x | Several vulnerabilities have been reported: a remote Denial of Service vulnerability was reported in the LDAP backend due to insufficient validation of user-supplied queries; and a remote Denial of Service vulnerability was reported due to an error when handling requests that are denied recursion. Update available at: Currently we are not aware of any exploits for these vulnerabilities. | Low | Secunia Advisory: SA16111, July 18, 2005 | |
SEO-Board 1.0 | A Cross-SIte Scripting vulnerability has been reported in the 'smilies_popup.php' script due to insufficient sanitization of the 'doc' parameter, which could let a remote malicious user execute arbitrary HTML and script code. No workaround or patch available at time of publishing. There is no exploit code required; however, a Proof of Concept exploit has been published. | SEO-Board | High | Security Tracker Alert ID: 1014509, July 18, 2005 |
Small Business Suite 1.0, PureMessage Anti-Virus 4.6, MailMonitor for SMTP 2.1, 2.0 , MailMonitor for Notes/Domino, Anti-Virus 5.0.1, 3.91, 3.90, 3.78-3.86, 3.4.6 | A remote Denial of Service vulnerability has been reported in the 'Extra field length' parameter value in BZIP2 archives due to insufficient validation. Updates available at: Updates may also be automatically applied by customers that are using the EM Library. A Proof of Concept exploit script has been published. | Sophos Anti-Virus ZIP Archive Remote Denial of Service | Low | iDEFENSE Security Advisory, July 14, 2005 |
SPiD 1.3.0 | A vulnerability has been reported in SPiD that could let remote malicious users include arbitrary files to execute arbitrary code. Upgrade available at: There is no exploit code required; however, a Proof of Concept exploit has been published. | SPiD Arbitrary File Inclusion | High | Security Focus, 14208, July 11, 2005 Security Focus, 14208, July 13, 2005 |
SquirrelMail 1.4.0 through 1.4.4 | Multiple vulnerabilities have been reported that could let remote malicious users conduct Cross-Site Scripting attacks. Upgrade to 1.4.4 and apply patch: http://prdownloads. Gentoo: Mandriva: Debian: There is no exploit code required. | SquirrelMail Cross-Site Scripting Vulnerabilities | High | SquirrelMail Advisory, June 15, 2005 Gentoo Linux Security Advisory, GLSA 200506-19, June 21, 2005 Mandriva Linux Security Update Advisory, MDKSA-2005:108, July 1, 2005 Debian Security Advisory , DSA 756-1, July 13, 2005 |
eApplication Server 5.2 | A buffer overflow vulnerability has been reported when an overly large JavaScript parameter is submitted to 'TreeAction.do' in '/WebConsole/,' which could let a remote malicious user execute arbitrary code. Patch information available at: Currently we are not aware of any exploits for this vulnerability. | Sybase EAServer Remote Buffer Overflow | High | SPI Dynamics Advisory, July 15, 2005 |
Web-Portal-System 0.7 | A vulnerability was reported in 'wps_shop.cgi' due to insufficient sanitization of the 'art' parameter before using in an 'open()' call, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required. | WPS 'Wps_shop.CGI' Remote Command Execution | High | Secunia Advisory: SA15780,July 14, 2005 |
Y.SAK scripts
| A vulnerability has been reported in the 'w_s3mbfm.cgi,' 'w_s3adix.cgi,' and 'w_s3sbfm.cgi' scripts due to insufficient validation of the 'no' parameter before using in an open() function call, which could let a remote malicious user execute arbitrary code. No workaround or patch available at time of publishing. There is no exploit code required. | Y.SAK Scripts Input Validation | High | Security Tracker Alert ID: 1014502, July 17, 2005 |
Yawp 1.0.6 | A vulnerability has been reported in the '_Yawp[conf_path]' parameter due to insufficient verification before used to include files, which could let a local/remote malicious user include arbitrary files.
Upgrade available at: There is no exploit code required. | Yawp '_Yawp[conf_ | High | Security Focus, 14237, July 13, 2005 |
[back to top] Wireless
The section below contains wireless vulnerabilities, articles, and viruses/trojans identified during this reporting period.
- Nothing significant to report.
Wireless Vulnerabilities
- Belkin Wireless Router Grants Administrative Access: A vulnerability has been reported in the belkin54g series because a telnet management access port is enabled by default, which could let a remote malicious user obtain administrative access.
- bluetest.pl.txt: A hacking bluetooth utility. See Script/Technique Table entry below.
- Nokia Affix BTFTP Arbitrary Code Execution: A buffer overflow vulnerability has been reported in Affix BTFTP that could let remote malicious users execute arbitrary code.
- Nokia Affix BTSRV/BTOBEX Remote Command Execution: A vulnerability has been reported in btsrv/btobex due to insufficient sanitization of input before using in a 'system()' call, which could let a remote malicious user execute arbitrary code.
- weplab-0.1.5.tar.gz: A tool that can review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are included. See Script/Technique Table entry below.
Recent Exploit Scripts/Techniques
The table below contains a sample of exploit scripts and "how to" guides identified during this period. The "Workaround or Patch Available" column indicates if vendors, security vulnerability listservs, or Computer Emergency Response Teams (CERTs) have published workarounds or patches.
Note: At times, scripts/techniques may contain names or content that may be considered offensive.
[back to
top]
name=trends>Trends
- Phishers Up Ante With 5x Spike In Trojans: According to Websense, a security vendor, a massive increase in the number of Trojan horses and Trojan horse downloaders, as well as a corresponding jump in the number of malicious sites, over the last three weeks means that a new, large-scale, coordinated phishing campaign is being waged by criminals. In July alone, there have been more than a thousand different sites that are hosting this malicious code, and more than 100 unique Trojans. Source: http://www.securitypipeline.com/showArticle.jhtml?articleId=166400034.
- VoIPong - VOIP Sniffer: This is a utility that detects all Voice Over IP calls
on a pipeline, and for those which are G711 encoded, dumps
actual conversation to separate wave files. It supports SIP,
H323, Cisco's Skinny Client Protocol, RTP and RTCP. On a 45 Mbit/sec actual network traffic, it's been verified that VoIPong successfully detected all VoIP gateways and the VoIP calls. Source: http://www.cwalsh.org/isnd/archives/000741.html. - Exploits for Vulnerabilities in Mozilla: US-CERT is aware of several new Mozilla Suite and Mozilla Firefox vulnerabilities, some of which have public exploits available. US-CERT encourages Firefox users to upgrade to version 1.0.5 as soon as possible and Mozilla Suite users to upgrade to version 1.7.9 when available.
Source: http://www.us-cert.gov/current/.
name=viruses id="viruses">Viruses/Trojans Top Ten Virus Threats
A list of high threat viruses, as reported to various anti-virus vendors and virus incident reporting organizations, has been ranked and categorized in the table below. For the purposes of collecting and collating data, infections involving multiple systems at a single location are considered a single infection. It is therefore possible that a virus has infected hundreds of machines but has only been counted once. With the number of viruses that appear each month, it is possible that a new virus will become widely distributed before the next edition of this publication. To limit the possibility of infection, readers are reminded to update their anti-virus packages as soon as updates become available. The table lists the viruses by ranking (number of sites affected), common virus name, type of virus code (i.e., boot, file, macro, multi-partite, script), trends (based on number of infections reported since last week), and approximate date first found.
face="Arial, Helvetica, sans-serif">Rank | Common Name | Type of Code |
face="Arial, Helvetica, sans-serif">Trend | Date |
face="Arial, Helvetica, sans-serif">Description |
1 | Netsky-P | Win 32 Worm | Slight Increase | March 2004 | A mass-mailing worm that uses its own SMTP engine to send itself to the email addresses it finds when scanning the hard drives and mapped drives. The worm also tries to spread through various file-sharing programs by copying itself into various shared folders. |
2 | Zafi-D | Win 32 Worm | Increase | December 2004 | A mass-mailing worm that sends itself to email addresses gathered from the infected computer. The worm may also attempt to lower security settings, terminate processes, and open a back door on the compromised computer. |
3 | Mytob.c | Win 32 Worm | Decrease | March 2004 | A mass-mailing worm with IRC backdoor functionality which can also infect computers vulnerable to the Windows LSASS (MS04-011) exploit. The worm will attempt to harvest email addresses from the local hard disk by scanning files. |
4 | Netsky-Q | Win 32 Worm | Slight Decrease | March 2004 | A mass-mailing worm that attempts to launch Denial of Service attacks against several web pages, deletes the entries belonging to several worms, and emits a sound through the internal speaker. |
4 | Mytob-BE | Win 32 Worm | New | June 2005 | A slight variant of the mass-mailing worm that utilizes an IRC backdoor, LSASS vulnerability, and email to propagate. Harvesting addresses from the Windows address book, disabling antivirus, and modifying data. |
6 | Lovgate.w | Win 32 Worm | Stable | April 2004 | A mass-mailing worm that propagates via by using MAPI as a reply to messages, by using an internal SMTP, by dropping copies of itself on network shares, and through peer-to-peer networks. Attempts to access all machines in the local area network. |
6 | Netsky-Z | Win 32 Worm | Increase | April 2004 | A mass-mailing worm that is very close to previous variants. The worm spreads in e-mails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665. |
6 | Mytob-AS | Win 32 Worm | New | June 2005 | A slight variant of the mass-mailing worm that disables security related programs and processes, redirection various sites, and changing registry values. This version downloads code from the net and utilizes its own email engine. |
9 | Netsky-D | Win 32 Worm | Decrease | March 2004 | A simplified variant of the Netsky mass-mailing worm in that it does not contain many of the text strings that were present in NetSky.C and it does not copy itself to shared folders. Netsky.D spreads itself in e-mails as an executable attachment only. |
10 | Mytob-EP | Win 32 Worm | New | June 2005 | Another slight variant of the mass-mailing worm that utilizes an IRC backdoor and LSASS vulnerability to propagate. Also propagates by email, harvesting addresses from the Windows address book. |
Table Updated July 16, 2005
Viruses or Trojans Considered to be a High Level of Threat
- Nothing significant to report.
Last updated
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.